US9069959B2 - Cryptographic circuit protection from differential power analysis - Google Patents

Cryptographic circuit protection from differential power analysis Download PDF

Info

Publication number
US9069959B2
US9069959B2 US13/725,377 US201213725377A US9069959B2 US 9069959 B2 US9069959 B2 US 9069959B2 US 201213725377 A US201213725377 A US 201213725377A US 9069959 B2 US9069959 B2 US 9069959B2
Authority
US
United States
Prior art keywords
power
circuit
processing circuit
cryptographic processing
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US13/725,377
Other versions
US20140181534A1 (en
Inventor
Juergen Nowottnick
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Morgan Stanley Senior Funding Inc
Original Assignee
NXP BV
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NXP BV filed Critical NXP BV
Priority to US13/725,377 priority Critical patent/US9069959B2/en
Assigned to NXP B.V. reassignment NXP B.V. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOWOTTNICK, JUERGEN
Priority to EP13198109.4A priority patent/EP2746985B1/en
Priority to CN201310713178.6A priority patent/CN103886254B/en
Publication of US20140181534A1 publication Critical patent/US20140181534A1/en
Application granted granted Critical
Publication of US9069959B2 publication Critical patent/US9069959B2/en
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. SECURITY AGREEMENT SUPPLEMENT Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12092129 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12681366 PREVIOUSLY RECORDED ON REEL 039361 FRAME 0212. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12681366 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to NXP B.V. reassignment NXP B.V. RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: MORGAN STANLEY SENIOR FUNDING, INC.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 042762 FRAME 0145. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 042985 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC. reassignment MORGAN STANLEY SENIOR FUNDING, INC. CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 039361 FRAME 0212. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT. Assignors: NXP B.V.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • G06F21/558
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/76Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in application-specific integrated circuits [ASIC] or field-programmable devices, e.g. field-programmable gate arrays [FPGA] or programmable logic devices [PLD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/72Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in cryptographic circuits
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/75Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation
    • G06F21/755Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by inhibiting the analysis of circuitry or operation with measures against power attack
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • G06F21/87Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits

Definitions

  • aspects of the present disclosure relate to apparatuses, devices, and methods involving cryptographic circuits, and more particularly, to providing protection from power-sensing attacks upon the cryptographic circuit.
  • Systems that make use of cryptographic protocols are vulnerable to implementation attacks especially where an attacker has physical access to a targeted device.
  • an attacker can monitor or modify the device in order to recover sensitive information. This can include obtaining a hidden key used for encryption.
  • physical access to a device allows an individual to detect data that can be used to significantly reduce the strength of the encryption algorithm. This use of detected data is sometimes referred to as a side-channel attack.
  • a particular type of side-channel attack is differential power analysis/attacks (DPA).
  • DPA differential power analysis/attacks
  • the side-channel information for DPA is based on the power consumption of the encryption processing circuit.
  • power consumption data from the encryption processing circuit allows an attacker to make reasonable assumptions regarding the encryption algorithm as it is being processed.
  • the power consumption data can be used to statistically determine, or at least make a reasonable guess, as to the exact key being used for encryption. This is particularly true when the encryption protocol is known to, or can be guessed by, the attacker.
  • DPA attacks can use signal processing and error correction properties. Using DPA, an adversary can obtain secret keys by analyzing power consumption measurements from multiple cryptographic operations performed by a vulnerable smart card or other device.
  • aspects of the present disclosure are directed to approaches to systems and methods useful for thwarting side channel attacks on encryption algorithms.
  • the present disclosure is exemplified in a number of implementations and applications including those presented below, which are commensurate with certain claims included with this patent document.
  • Certain embodiments are directed toward a device that has an integrated circuit (IC) die that is configured to provide cryptographic functions.
  • the IC die can include a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit. This detectable change can be used to obtain information about the cryptographic algorithm. For instance, the detectable change can be used to infer characteristics of a secret key used during the execution of the cryptographic algorithm.
  • a power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
  • An encapsulation structure is designed to encapsulate the cryptographic processing circuit and the power storage circuit. The encapsulation structure is configured and arranged to prevent physical tampering.
  • a control circuit is configured and arranged to charge the power storage circuit by providing power from an external power source.
  • the control circuit is also configured and arranged to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
  • a device includes an IC die having a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that is subject to side channel attacks that use power consumption of the cryptographic processing circuit.
  • a power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
  • An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit and that is configured and arranged to prevent physical tampering therewith.
  • a first electrical connection port is provided for external connection relative to the IC die.
  • a switching control circuit is configured and arranged to operate in each of two alternative modes. A first mode charges the power storage circuit using power provided from an external power source.
  • a second mode acts to block the power provided from the external power source and to provide power from the power storage circuit to the cryptographic processing circuit.
  • the switching control circuit is configured and arranged to determine a condition prompting execution of the algorithm and in response to the determination, select between the two alternative modes.
  • a second electrical connection port is provided for external connection between the switching control circuit and electrical connection port of the integrated circuit die.
  • Certain embodiments are directed toward a method that includes the execution, using a cryptographic processing circuit, of a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit.
  • Power is stored in a power storage circuit. The amount of stored power is sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
  • a switching circuit is controlled in order to charge the power storage circuit by providing power from an external power source, and to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
  • FIG. 1 depicts a block diagram of a system and device for providing cryptographic processing, consistent with embodiments of the present disclosure
  • FIG. 2 depicts a circuit diagram of a device for providing cryptographic processing, consistent with embodiments of the present disclosure
  • FIG. 3 depicts a diagram that includes trace routing, consistent with embodiments of the present disclosure.
  • FIG. 4 depicts a passive-keyless entry (PKE) system for use with automotive applications, consistent with embodiments of the present disclosure.
  • PKE passive-keyless entry
  • Embodiments of the present disclosure are directed toward a device that provides cryptographic processing functions using secret data, such as a private encryption key.
  • the secret data can be stored in a location that is protected from external attempts at accessing the data. This protection can include, for example, physical tamper resistant encapsulation of an encryption processing circuit and memory.
  • the device can include further protection of the secret data relative to attempts at monitoring the power consumption of the encryption processing circuit and memory. This can be particularly useful for counteracting attacks that use differential power analysis (DPA) in order to infer information about the secret data or key.
  • DPA differential power analysis
  • Particular embodiments decouple the encryption processing circuit and memory from external power source(s) during encryption-related computations.
  • a local power storage element such as a capacitive element, can provide power while decoupled from the external power source(s). The local power storage element can then be reconnected and charged once the encryption-related computations are completed or paused.
  • Certain embodiments are directed toward a device that has an integrated circuit (IC) die configured to provide cryptographic functions.
  • the IC die can include a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit. This detectable change can be used to obtain information about the cryptographic algorithm. For instance, the detectable change can be used to infer characteristics of a secret key used during the execution of the cryptographic algorithm.
  • a power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
  • An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit. The encapsulation structure is configured and arranged to prevent physical tampering.
  • a control circuit is configured and arranged to charge the power storage circuit by providing power from an external power source.
  • the control circuit is also configured and arranged to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
  • a device includes an IC die having a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that is subject to side channel attacks that use power consumption of the cryptographic processing circuit.
  • a power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
  • An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit and is configured and arranged to prevent physical tampering therewith.
  • a first electrical connection port is provided for external connection relative to the IC die.
  • a switching control circuit is configured and arranged to operate in each of two alternative modes. A first mode charges the power storage circuit using power provided from an external power source.
  • a second mode acts to block the power provided from the external power source and to provide power from the power storage circuit to the cryptographic processing circuit.
  • the switching control circuit is configured and arranged to determine a condition prompting execution of the algorithm and in response to the determination, select between the two alternative modes.
  • a second electrical connection port is provided for external connection between the switching control circuit and electrical connection port of the integrated circuit die.
  • Particular embodiments of the present disclosure are directed toward routing of power-providing electrical traces underneath an inductive (antenna) coil. This can be particularly useful for inhibiting detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit.
  • One or more electrical vias can be used to connect an external power source to the electrical traces, which can be located in an intermediate layer of a printed circuit board (PCB) or substrate.
  • PCB printed circuit board
  • an inductive coil can receive power from received radio frequency (RF) signals and to provide the received power to the control circuit.
  • RF radio frequency
  • power can be provided from a battery or external input.
  • the power storage circuit can be constructed using a capacitive circuit with one or more capacitors.
  • the power storage circuit can be constructed with enough capacitance to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. This can be adjusted as a function of voltage level of the input power and/or the particulars of the cryptographic algorithm and cryptographic processing circuit. For instance, the power storage circuit can be designed to compensate for worst case conditions (e.g., relative to power consumption and voltage from the external power supply).
  • a few example cryptographic algorithms include, but are not limited to, DES, triple DES, AES and RSA. These and other cryptographic algorithms can use a private key to generate a security code that can be communicated to by a remote system. The remote system is then able to verify the security code.
  • the cryptographic device can be used to provide a security code to an automobile (keyless) entry system.
  • Such a device can function as an automotive key that includes a transponder configured and arranged to wirelessly communicate with an associated vehicle.
  • the embodiments function as a passive-keyless-entry (PKE) device powered by a battery located on a substrate that supports the integrated circuit die and the control circuit.
  • PKE passive-keyless-entry
  • Certain embodiments of the present disclosure relate to more complex control over switching circuitry connecting the external power supply to the local power storage circuit.
  • the power storage circuit may not contain sufficient energy to complete an entire cryptographic function.
  • the control circuit can be configured and arranged to reconnect the local power storage circuit to the external power supply during a cryptographic function.
  • the cryptographic processing circuit can be paused while the power storage circuit is charged. In this manner, the power drawn from the external power supply is a function of the capacitance of the local power storage circuit. Accordingly, the power draw is not directly correlated to the cryptographic processing functions.
  • FIG. 1 depicts a block diagram of a system and device for providing cryptographic processing, consistent with embodiments of the present disclosure.
  • Cryptographic processing circuit 114 can be configured and arranged to provide encryption functions for various security applications. This can include receiving an input value and then encrypting the input value using secure key 116 (e.g., using Data Encryption Standard (DES), triple DES, Advanced Encryption Standard (AES), Rivest, Shamir, and Adleman (RSA) and elliptic curve cryptography (ECC)). The resulting encrypted value can then be provided as an output.
  • secure key 116 e.g., using Data Encryption Standard (DES), triple DES, Advanced Encryption Standard (AES), Rivest, Shamir, and Adleman (RSA) and elliptic curve cryptography (ECC)
  • a processing circuit 108 can be configured and arranged to interface with cryptographic processing circuit 114 .
  • Processing circuit 108 can provide various functions tailored to the particular application. This separation of processing functions can be particularly useful when the cryptographic processing circuit 114 is encapsulated ( 110 ) to protect from physical tampering. Processing circuit 108 can be denied access to the secure key 116 , and therefore, can be located outside of the encapsulation 110 .
  • Side channel attacks can take advantage of detectable parameters to infer information about the secure key 116 .
  • the information can reduce the effectiveness of the encryption and allow an attacker to more easily determine the secure key 116 .
  • a particular detectable parameter is the amount of power drawn by cryptographic processing circuit 114 .
  • power storage circuit 112 can used to power the cryptographic processing circuit 114 .
  • Switching control circuit 106 can disconnect the cryptographic processing circuit 114 from external power sources 102 - 104 during cryptographic processing. Accordingly, an attacker can be prevented from seeing any power drawn from the external power sources 102 - 104 while the cryptographic processing circuit 114 is active.
  • processing circuit 108 can provide an indication that cryptographic functions are to be carried out. In response, switching control circuit 106 can disconnect the cryptographic processing circuit 114 from external power sources 102 - 104 . Processing circuit 108 can provide an indication that the cryptographic functions are completed. In response, switching control circuit 106 can reconnect the cryptographic processing circuit 114 to external power sources 102 - 104 and thereby charge the power storage circuit 112 .
  • the power storing capabilities of the power storage circuit 112 can be set to sufficiently allow an entire encryption algorithm/function to be completed before recharging is required. This can be determined as a function of the power drawn by the cryptographic processing circuit 114 , the length of time required to complete the entire encryption algorithm/function and/or the voltage level of the input supply.
  • the cryptographic processing circuit 114 can include one or more voltage regulator circuits.
  • the use of a voltage regulator circuit can be particularly useful where the power storage circuit 112 is a capacitive circuit that provides a changing/reduced voltage level as power is drawn by the cryptographic processing circuit 114 .
  • the voltage regulator circuit can be configured to provide a (relatively) stable voltage to the cryptographic processing circuit 114 over a wide range of input voltages. This can help to increase the amount of energy that can be recovered from a capacitive circuit (e.g., by allowing the capacitor to be charged to a higher voltage level and/or discharged to a lower voltage level).
  • FIG. 2 depicts a circuit diagram of a device for providing cryptographic processing, consistent with embodiments of the present disclosure.
  • Calculation unit/module 210 can be configured and arranged to provide cryptographic processing functions, such as DES, triple DES, AES, RSA or ECC. These example cryptographic processing functions are not meant to be limiting.
  • Switches 208 and 214 selectively couple the calculation unit/module 210 to external power sources 202 and 216 , respectively. Control signal(s) can be used to ensure that both switches 208 and 214 are open whenever the calculation unit/module 210 is actively processing a cryptographic function. When both switches 208 and 214 are open, calculation unit/module 210 draws its power from capacitive circuit 212 .
  • Switches 208 and 214 can be selectively closed when calculation unit/module 210 is not processing a cryptographic function and when their respective power source ( 202 or 216 ) is selected for use. When closed, the respective power source charges the capacitive circuit 212 . This charging of capacitive circuit 212 can therefore be accomplished substantially independent from the processing performed by calculation unit/module 210 . This includes charging both following an RC-type curve and being disparate in time, relative to when the processing of the calculation unit/module 210 takes place. Such independence can be particularly useful for thwarting DPA attacks.
  • FIG. 3 depicts a diagram that includes trace routing, consistent with embodiments of the present disclosure.
  • the device depicted in FIG. 3 includes a number of components or modules that can be located on a common substrate or printed circuit board (PCB) 302 .
  • One such component is a radio frequency (RF) interface circuit 304 .
  • RF interface circuit 304 provides signal processing for wireless communications received (or transmitted) by antenna/coil 310 .
  • Application processor 306 can receive data from and provide data to the RF interface circuit 304 .
  • certain embodiments relate to a wireless key for automobiles.
  • the application's processor can transmit and receive data over the RF interface circuit 304 to communicate with a transceiver in an automobile.
  • a security circuit in the automobile can require a confirmation that the key is authentic and for the proper automobile.
  • Application processor 306 can provide this confirmation using security data received from cryptographic processing circuit 316 .
  • Cryptographic processing circuit 316 can generate the security data using a locally-stored private key and a particular encryption algorithm. Maintaining the secrecy of the private key can be accomplished using physical tamper protection 312 (e.g., encapsulating the IC die 314 and the cryptographic processing circuit 316 ).
  • a local power storage circuit 318 e.g., a capacitive circuit
  • power can be provided from a battery 303 and/or from the RF interface circuit 304 .
  • External sources of power are also possible.
  • Switch control circuit 308 can connect either source of power to the local power storage circuit 318 to allow charging thereof. When cryptographic processing circuit 316 is actively processing, however, switch control circuit 308 can disconnect both sources of power, and thereby power the cryptographic processing circuit 316 from the local power storage circuit 318 .
  • Embodiments of the present disclosure provide additional security by selective routing traces that connect switch control circuit 308 to the local power storage circuit 318 .
  • the selective routing of the traces can make monitoring of power difficult for a potential attacker. This can include, for example, routing the traces on an internal layer of the substrate or PCB 302 .
  • the electrical traces can be routed underneath the antenna/coil 310 . This can be particularly useful for masking electromagnetic signals originating from the electrical traces. Accordingly, the selective trace routing can inhibit detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit 316 .
  • the vias can be located underneath IC dies for one or both of the switch control circuit 308 and the cryptographic processing circuit 316 .
  • FIG. 4 depicts a passive-keyless entry (PKE) system for use with automotive applications, consistent with embodiments of the present disclosure.
  • the PKE system can be configured to perform various functions, such as opening a door or trunk hatch and/or allowing the driver to start and stop the car with the push of a button.
  • PKE device e.g., a key-fob
  • Automobile 402 can include a security circuit that interrogates PKE device 404 to verify that PKE device 404 is the correct key.
  • PKE device 404 can provide verification by performing a cryptographic function using secure key 406 .
  • PKE device 404 can be powered by a battery during normal operation. PKE device 404 can also use power received over RF signals to power the device. In certain embodiments, the RF signals can be used as a backup power source (e.g., when the battery is depleted). In this manner, the PKE device 404 may have an increased operating range when the battery is powered, but still function, at a reduced range, when the battery is drained.
  • Certain embodiments of the present disclosure are directed toward the use of multiple power storage elements. For instance, two or more capacitors can be used to power the cryptographic processing circuit. In more particular embodiments, one of the multiple capacitors can be charged while the other powers the cryptographic processing circuit. This can be accomplished, for example, but adding additional switches to allow for selective connection of each capacitor to an external power source and the cryptographic processing circuit. In this manner, the power drawn from the external power source is still not directly from the cryptographic processing circuit, but the external power source can be used to charge one or more of the capacitors that are not currently being used to power the cryptographic processing circuit. Switching control circuitry can automatically switch the capacitor providing power to the cryptographic processing circuit in response to detecting the voltage level going below a threshold level, or after a certain time period. This can be particularly useful for reducing the size of the capacitor(s) required to power the cryptographic processing circuit.
  • modules may be implemented to carry out one or more of the operations and activities described herein and/or shown in the Figures.
  • a “module” is a circuit that carries out one or more of these or related operations/activities.
  • one or more modules are discrete logic circuits or programmable logic circuits configured and arranged for implementing these operations/activities, as in the circuit modules shown in the Figures.
  • the programmable circuit is one or more computer circuits programmed to execute a set (or sets) of instructions (and/or configuration data).
  • the instructions (and/or configuration data) can be in the form of firmware or software stored in and accessible from a memory (circuit).
  • first and second modules include a combination of a CPU hardware-based circuit and a set of instructions in the form of firmware, where the first module includes a first CPU hardware circuit with one set of instructions and the second module includes a second CPU hardware circuit with another set of instructions.
  • Certain embodiments are directed to a computer program product (e.g., nonvolatile memory device), which includes a machine or computer-readable medium having stored thereon instructions which may be executed by a computer (or other electronic device) to perform these operations/activities.
  • a computer program product e.g., nonvolatile memory device
  • the power storage element can include multiple capacitors arranged in parallel.
  • combinations of one or more embodiments are also contemplated. Such modifications do not depart from the true spirit and scope of various aspects of the disclosure, including aspects set forth in the claims.

Abstract

According to an example embodiment, a device provides cryptographic processing functions using secret data. The device can include protection from differential power analysis (DPA). The encryption processing circuit and its memory can be decoupled from external power source(s) during encryption-related computations. A local power storage element, such as a capacitive element, can provide power while the encryption processing circuit is decoupled from the external power source(s). The local power storage element can then be reconnected and charged once the encryption-related computations are completed or paused.

Description

Aspects of the present disclosure relate to apparatuses, devices, and methods involving cryptographic circuits, and more particularly, to providing protection from power-sensing attacks upon the cryptographic circuit.
Systems that make use of cryptographic protocols are vulnerable to implementation attacks especially where an attacker has physical access to a targeted device. With physical access to the targeted device, an attacker can monitor or modify the device in order to recover sensitive information. This can include obtaining a hidden key used for encryption. For instance, physical access to a device allows an individual to detect data that can be used to significantly reduce the strength of the encryption algorithm. This use of detected data is sometimes referred to as a side-channel attack. A particular type of side-channel attack is differential power analysis/attacks (DPA). The side-channel information for DPA is based on the power consumption of the encryption processing circuit.
For instance, power consumption data from the encryption processing circuit allows an attacker to make reasonable assumptions regarding the encryption algorithm as it is being processed. The power consumption data can be used to statistically determine, or at least make a reasonable guess, as to the exact key being used for encryption. This is particularly true when the encryption protocol is known to, or can be guessed by, the attacker. DPA attacks can use signal processing and error correction properties. Using DPA, an adversary can obtain secret keys by analyzing power consumption measurements from multiple cryptographic operations performed by a vulnerable smart card or other device.
Aspects of the present disclosure are directed to approaches to systems and methods useful for thwarting side channel attacks on encryption algorithms. The present disclosure is exemplified in a number of implementations and applications including those presented below, which are commensurate with certain claims included with this patent document.
Certain embodiments are directed toward a device that has an integrated circuit (IC) die that is configured to provide cryptographic functions. The IC die can include a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit. This detectable change can be used to obtain information about the cryptographic algorithm. For instance, the detectable change can be used to infer characteristics of a secret key used during the execution of the cryptographic algorithm. A power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. An encapsulation structure is designed to encapsulate the cryptographic processing circuit and the power storage circuit. The encapsulation structure is configured and arranged to prevent physical tampering. This can include, for instance, protective measures that disable the cryptographic processing circuit if the encapsulation is removed or broken. A control circuit is configured and arranged to charge the power storage circuit by providing power from an external power source. The control circuit is also configured and arranged to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
Consistent with various embodiments, a device includes an IC die having a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that is subject to side channel attacks that use power consumption of the cryptographic processing circuit. A power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit and that is configured and arranged to prevent physical tampering therewith. A first electrical connection port is provided for external connection relative to the IC die. A switching control circuit is configured and arranged to operate in each of two alternative modes. A first mode charges the power storage circuit using power provided from an external power source. A second mode acts to block the power provided from the external power source and to provide power from the power storage circuit to the cryptographic processing circuit. The switching control circuit is configured and arranged to determine a condition prompting execution of the algorithm and in response to the determination, select between the two alternative modes. A second electrical connection port is provided for external connection between the switching control circuit and electrical connection port of the integrated circuit die.
Certain embodiments are directed toward a method that includes the execution, using a cryptographic processing circuit, of a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit. Power is stored in a power storage circuit. The amount of stored power is sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. A switching circuit is controlled in order to charge the power storage circuit by providing power from an external power source, and to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
The above discussion/summary is not intended to describe each embodiment or every implementation of the present disclosure. The figures and detailed description that follow also exemplify various embodiments.
Various example embodiments may be more completely understood in consideration of the following detailed description in connection with the accompanying drawings, in which:
FIG. 1 depicts a block diagram of a system and device for providing cryptographic processing, consistent with embodiments of the present disclosure;
FIG. 2 depicts a circuit diagram of a device for providing cryptographic processing, consistent with embodiments of the present disclosure;
FIG. 3 depicts a diagram that includes trace routing, consistent with embodiments of the present disclosure; and
FIG. 4 depicts a passive-keyless entry (PKE) system for use with automotive applications, consistent with embodiments of the present disclosure.
While various embodiments discussed herein are amenable to modifications and alternative forms, aspects thereof have been shown by way of example in the drawings and will be described in detail. It should be understood, however, that the intention is not to limit the disclosure to the particular embodiments described. On the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure including aspects defined in the claims. In addition, the term “example” as used throughout this application is only by way of illustration, and not limitation.
Aspects of the present disclosure are believed to be applicable to a variety of different types of apparatuses, systems and methods involving cryptographic processing and protection from side channel attacks. While not necessarily so limited, various aspects may be appreciated through a discussion of examples using this context.
Embodiments of the present disclosure are directed toward a device that provides cryptographic processing functions using secret data, such as a private encryption key. The secret data can be stored in a location that is protected from external attempts at accessing the data. This protection can include, for example, physical tamper resistant encapsulation of an encryption processing circuit and memory. The device can include further protection of the secret data relative to attempts at monitoring the power consumption of the encryption processing circuit and memory. This can be particularly useful for counteracting attacks that use differential power analysis (DPA) in order to infer information about the secret data or key. Particular embodiments decouple the encryption processing circuit and memory from external power source(s) during encryption-related computations. A local power storage element, such as a capacitive element, can provide power while decoupled from the external power source(s). The local power storage element can then be reconnected and charged once the encryption-related computations are completed or paused.
Certain embodiments are directed toward a device that has an integrated circuit (IC) die configured to provide cryptographic functions. The IC die can include a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit. This detectable change can be used to obtain information about the cryptographic algorithm. For instance, the detectable change can be used to infer characteristics of a secret key used during the execution of the cryptographic algorithm. A power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit. The encapsulation structure is configured and arranged to prevent physical tampering. This can include, for instance, protective measures that disable the cryptographic processing circuit if the encapsulation is removed or broken. A control circuit is configured and arranged to charge the power storage circuit by providing power from an external power source. The control circuit is also configured and arranged to disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source.
Consistent with various embodiments, a device includes an IC die having a cryptographic processing circuit that is configured and arranged to execute a cryptographic algorithm that is subject to side channel attacks that use power consumption of the cryptographic processing circuit. A power storage circuit is configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. An encapsulation structure encapsulates the cryptographic processing circuit and the power storage circuit and is configured and arranged to prevent physical tampering therewith. A first electrical connection port is provided for external connection relative to the IC die. A switching control circuit is configured and arranged to operate in each of two alternative modes. A first mode charges the power storage circuit using power provided from an external power source. A second mode acts to block the power provided from the external power source and to provide power from the power storage circuit to the cryptographic processing circuit. The switching control circuit is configured and arranged to determine a condition prompting execution of the algorithm and in response to the determination, select between the two alternative modes. A second electrical connection port is provided for external connection between the switching control circuit and electrical connection port of the integrated circuit die.
Particular embodiments of the present disclosure are directed toward routing of power-providing electrical traces underneath an inductive (antenna) coil. This can be particularly useful for inhibiting detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit. One or more electrical vias can be used to connect an external power source to the electrical traces, which can be located in an intermediate layer of a printed circuit board (PCB) or substrate.
Consistent with one or more embodiments, an inductive coil can receive power from received radio frequency (RF) signals and to provide the received power to the control circuit. In certain embodiments, power can be provided from a battery or external input.
As discussed herein, the power storage circuit can be constructed using a capacitive circuit with one or more capacitors. The power storage circuit can be constructed with enough capacitance to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm. This can be adjusted as a function of voltage level of the input power and/or the particulars of the cryptographic algorithm and cryptographic processing circuit. For instance, the power storage circuit can be designed to compensate for worst case conditions (e.g., relative to power consumption and voltage from the external power supply).
A few example cryptographic algorithms include, but are not limited to, DES, triple DES, AES and RSA. These and other cryptographic algorithms can use a private key to generate a security code that can be communicated to by a remote system. The remote system is then able to verify the security code. For instance, the cryptographic device can be used to provide a security code to an automobile (keyless) entry system. Such a device can function as an automotive key that includes a transponder configured and arranged to wirelessly communicate with an associated vehicle. The embodiments function as a passive-keyless-entry (PKE) device powered by a battery located on a substrate that supports the integrated circuit die and the control circuit.
Certain embodiments of the present disclosure relate to more complex control over switching circuitry connecting the external power supply to the local power storage circuit. For instance, the power storage circuit may not contain sufficient energy to complete an entire cryptographic function. Accordingly, the control circuit can be configured and arranged to reconnect the local power storage circuit to the external power supply during a cryptographic function. In certain instances, the cryptographic processing circuit can be paused while the power storage circuit is charged. In this manner, the power drawn from the external power supply is a function of the capacitance of the local power storage circuit. Accordingly, the power draw is not directly correlated to the cryptographic processing functions.
Turning now to the figures, FIG. 1 depicts a block diagram of a system and device for providing cryptographic processing, consistent with embodiments of the present disclosure. Cryptographic processing circuit 114 can be configured and arranged to provide encryption functions for various security applications. This can include receiving an input value and then encrypting the input value using secure key 116 (e.g., using Data Encryption Standard (DES), triple DES, Advanced Encryption Standard (AES), Rivest, Shamir, and Adleman (RSA) and elliptic curve cryptography (ECC)). The resulting encrypted value can then be provided as an output.
In certain embodiments, a processing circuit 108 can be configured and arranged to interface with cryptographic processing circuit 114. Processing circuit 108 can provide various functions tailored to the particular application. This separation of processing functions can be particularly useful when the cryptographic processing circuit 114 is encapsulated (110) to protect from physical tampering. Processing circuit 108 can be denied access to the secure key 116, and therefore, can be located outside of the encapsulation 110.
Side channel attacks can take advantage of detectable parameters to infer information about the secure key 116. The information can reduce the effectiveness of the encryption and allow an attacker to more easily determine the secure key 116. A particular detectable parameter is the amount of power drawn by cryptographic processing circuit 114. Accordingly, power storage circuit 112 can used to power the cryptographic processing circuit 114. Switching control circuit 106 can disconnect the cryptographic processing circuit 114 from external power sources 102-104 during cryptographic processing. Accordingly, an attacker can be prevented from seeing any power drawn from the external power sources 102-104 while the cryptographic processing circuit 114 is active.
Consistent with embodiments of the present disclosure, processing circuit 108 can provide an indication that cryptographic functions are to be carried out. In response, switching control circuit 106 can disconnect the cryptographic processing circuit 114 from external power sources 102-104. Processing circuit 108 can provide an indication that the cryptographic functions are completed. In response, switching control circuit 106 can reconnect the cryptographic processing circuit 114 to external power sources 102-104 and thereby charge the power storage circuit 112.
Although power will be drawn from external power sources 102-104, the power will be used to charge power storage circuit 112. This can effectively decouple (in time) the power drawn by the device from the actual processing algorithm carried out by the cryptographic processing circuit 114.
Consistent with certain embodiments, the power storing capabilities of the power storage circuit 112 can be set to sufficiently allow an entire encryption algorithm/function to be completed before recharging is required. This can be determined as a function of the power drawn by the cryptographic processing circuit 114, the length of time required to complete the entire encryption algorithm/function and/or the voltage level of the input supply.
Consistent with embodiments of the present disclosure, the cryptographic processing circuit 114 can include one or more voltage regulator circuits. The use of a voltage regulator circuit can be particularly useful where the power storage circuit 112 is a capacitive circuit that provides a changing/reduced voltage level as power is drawn by the cryptographic processing circuit 114. The voltage regulator circuit can be configured to provide a (relatively) stable voltage to the cryptographic processing circuit 114 over a wide range of input voltages. This can help to increase the amount of energy that can be recovered from a capacitive circuit (e.g., by allowing the capacitor to be charged to a higher voltage level and/or discharged to a lower voltage level).
FIG. 2 depicts a circuit diagram of a device for providing cryptographic processing, consistent with embodiments of the present disclosure. Calculation unit/module 210 can be configured and arranged to provide cryptographic processing functions, such as DES, triple DES, AES, RSA or ECC. These example cryptographic processing functions are not meant to be limiting. Switches 208 and 214 selectively couple the calculation unit/module 210 to external power sources 202 and 216, respectively. Control signal(s) can be used to ensure that both switches 208 and 214 are open whenever the calculation unit/module 210 is actively processing a cryptographic function. When both switches 208 and 214 are open, calculation unit/module 210 draws its power from capacitive circuit 212.
Switches 208 and 214 can be selectively closed when calculation unit/module 210 is not processing a cryptographic function and when their respective power source (202 or 216) is selected for use. When closed, the respective power source charges the capacitive circuit 212. This charging of capacitive circuit 212 can therefore be accomplished substantially independent from the processing performed by calculation unit/module 210. This includes charging both following an RC-type curve and being disparate in time, relative to when the processing of the calculation unit/module 210 takes place. Such independence can be particularly useful for thwarting DPA attacks.
FIG. 3 depicts a diagram that includes trace routing, consistent with embodiments of the present disclosure. The device depicted in FIG. 3 includes a number of components or modules that can be located on a common substrate or printed circuit board (PCB) 302. One such component is a radio frequency (RF) interface circuit 304. RF interface circuit 304 provides signal processing for wireless communications received (or transmitted) by antenna/coil 310. Application processor 306 can receive data from and provide data to the RF interface circuit 304.
For instance, certain embodiments relate to a wireless key for automobiles. The application's processor can transmit and receive data over the RF interface circuit 304 to communicate with a transceiver in an automobile. A security circuit in the automobile can require a confirmation that the key is authentic and for the proper automobile. Application processor 306 can provide this confirmation using security data received from cryptographic processing circuit 316. Cryptographic processing circuit 316 can generate the security data using a locally-stored private key and a particular encryption algorithm. Maintaining the secrecy of the private key can be accomplished using physical tamper protection 312 (e.g., encapsulating the IC die 314 and the cryptographic processing circuit 316). In certain embodiments, a local power storage circuit 318 (e.g., a capacitive circuit) can also be protected from physical tampering.
Consistent with embodiments of the present disclosure, power can be provided from a battery 303 and/or from the RF interface circuit 304. External sources of power are also possible. Switch control circuit 308 can connect either source of power to the local power storage circuit 318 to allow charging thereof. When cryptographic processing circuit 316 is actively processing, however, switch control circuit 308 can disconnect both sources of power, and thereby power the cryptographic processing circuit 316 from the local power storage circuit 318.
Embodiments of the present disclosure provide additional security by selective routing traces that connect switch control circuit 308 to the local power storage circuit 318. The selective routing of the traces can make monitoring of power difficult for a potential attacker. This can include, for example, routing the traces on an internal layer of the substrate or PCB 302. Moreover, the electrical traces can be routed underneath the antenna/coil 310. This can be particularly useful for masking electromagnetic signals originating from the electrical traces. Accordingly, the selective trace routing can inhibit detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit 316. Consistent with certain embodiments, the vias can be located underneath IC dies for one or both of the switch control circuit 308 and the cryptographic processing circuit 316.
FIG. 4 depicts a passive-keyless entry (PKE) system for use with automotive applications, consistent with embodiments of the present disclosure. The PKE system can be configured to perform various functions, such as opening a door or trunk hatch and/or allowing the driver to start and stop the car with the push of a button. PKE device (e.g., a key-fob) 404 can contain a secure key 406. Automobile 402 can include a security circuit that interrogates PKE device 404 to verify that PKE device 404 is the correct key. PKE device 404 can provide verification by performing a cryptographic function using secure key 406.
Consistent with certain embodiments, PKE device 404 can be powered by a battery during normal operation. PKE device 404 can also use power received over RF signals to power the device. In certain embodiments, the RF signals can be used as a backup power source (e.g., when the battery is depleted). In this manner, the PKE device 404 may have an increased operating range when the battery is powered, but still function, at a reduced range, when the battery is drained.
Certain embodiments of the present disclosure are directed toward the use of multiple power storage elements. For instance, two or more capacitors can be used to power the cryptographic processing circuit. In more particular embodiments, one of the multiple capacitors can be charged while the other powers the cryptographic processing circuit. This can be accomplished, for example, but adding additional switches to allow for selective connection of each capacitor to an external power source and the cryptographic processing circuit. In this manner, the power drawn from the external power source is still not directly from the cryptographic processing circuit, but the external power source can be used to charge one or more of the capacitors that are not currently being used to power the cryptographic processing circuit. Switching control circuitry can automatically switch the capacitor providing power to the cryptographic processing circuit in response to detecting the voltage level going below a threshold level, or after a certain time period. This can be particularly useful for reducing the size of the capacitor(s) required to power the cryptographic processing circuit.
Various modules may be implemented to carry out one or more of the operations and activities described herein and/or shown in the Figures. In these contexts, a “module” is a circuit that carries out one or more of these or related operations/activities. For example, in certain of the above-discussed embodiments, one or more modules are discrete logic circuits or programmable logic circuits configured and arranged for implementing these operations/activities, as in the circuit modules shown in the Figures. In certain embodiments, the programmable circuit is one or more computer circuits programmed to execute a set (or sets) of instructions (and/or configuration data). The instructions (and/or configuration data) can be in the form of firmware or software stored in and accessible from a memory (circuit). As an example, first and second modules include a combination of a CPU hardware-based circuit and a set of instructions in the form of firmware, where the first module includes a first CPU hardware circuit with one set of instructions and the second module includes a second CPU hardware circuit with another set of instructions.
Certain embodiments are directed to a computer program product (e.g., nonvolatile memory device), which includes a machine or computer-readable medium having stored thereon instructions which may be executed by a computer (or other electronic device) to perform these operations/activities.
Based upon the above discussion and illustrations, those skilled in the art will readily recognize that various modifications and changes may be made to the various embodiments without strictly following the exemplary embodiments and applications illustrated and described herein. For instance, the power storage element can include multiple capacitors arranged in parallel. Moreover, combinations of one or more embodiments are also contemplated. Such modifications do not depart from the true spirit and scope of various aspects of the disclosure, including aspects set forth in the claims.

Claims (16)

What is claimed is:
1. A device comprising:
an integrated circuit die having
a cryptographic processing circuit configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit;
a power storage circuit configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm; and
an encapsulation structure that encapsulates the cryptographic processing circuit and the power storage circuit and that is configured and arranged to prevent physical tampering therewith;
a control circuit configured and arranged to
charge the power storage circuit by providing power from an external power source; and
disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source;
a substrate having one or more electrical traces configured and located in an intermediate layer of the substrate and to provide power from the control circuit to the integrated circuit die; and
an inductive coil configured and arranged to receive power from received radio frequency (RF) signals and to at least mitigate detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit.
2. The device of claim 1, further including a printed circuit board having the one or more electrical traces configured and arranged to provide power from the control circuit to the integrated circuit die.
3. The device of claim 1, wherein the electrical traces are configured and routed underneath the inductive coil to inhibit detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit.
4. The device of claim 1, wherein the encapsulation structure is configured and arranged to prevent operation of the cryptographic processing circuit in response to physical tampering with the encapsulation structure.
5. The device of claim 1, wherein the power storage circuit includes a capacitive circuit with one or more capacitors, the capacitive circuit having sufficient capacitance to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm.
6. The device of claim 1, wherein the cryptographic algorithm is one of DES, triple DES, AES, RSA and ECC.
7. The device of claim 1, further including processing circuitry configured and arranged to use output data from the cryptographic processing circuit to provide a security code to an automobile entry system.
8. The device of claim 1, where the device is an automotive key that further includes a transponder configured and arranged to wirelessly receive power during use of the automotive key.
9. The device of claim 1, where the device is an automotive key configured and arranged to operate as a passive-keyless-entry (PKE) device powered by a battery located on a substrate that supports the integrated circuit die and the control circuit.
10. A method comprising:
executing, using a cryptographic processing circuit that forms part of an integrated circuit die situated on a substrate, a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit;
storing, in a power storage circuit that forms another part of the integrated circuit die, power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm;
controlling a switching circuit to
charge the power storage circuit by providing power from an external power source, and
disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source; and
wherein executing the cryptographic algorithm includes providing power signals from the power storage circuit to the cryptographic processing circuit via connected electrical traces and using an inductive coil to at least mitigate detection of electromagnetic field changes caused by power drawn through the traces.
11. The method of claim 10, wherein the step of executing a cryptographic algorithm includes using a private key to encode data.
12. The method of claim 10, wherein the step of charging the power storage circuit includes using the inductive coil to receive power from received RF signals, and using the received power for charging a capacitor located within an encapsulation structure that includes the capacitor and the cryptographic processing circuit.
13. A device comprising:
an integrated circuit die having
a cryptographic processing circuit configured and arranged to execute a cryptographic algorithm that is subject to side channel attacks that use power consumption of the cryptographic processing circuit;
a power storage circuit configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm;
an encapsulation structure that encapsulates the cryptographic processing circuit and the power storage circuit and that is configured and arranged to prevent physical tampering therewith;
a first electrical connection port for external connection;
a switching control circuit configured and arranged to
operate in each of two alternative modes, a first mode charging the power storage circuit using power provided from an external power source and a second mode acting to block the power provided from the external power source and to provide power from the power storage circuit to the cryptographic processing circuit,
determine a condition prompting execution of the algorithm and in response to the determination, select between the two alternative modes;
an electrical trace configured and arranged to couple power from the power storage circuit to the cryptographic processing circuit in the second mode;
an inductive coil configured and arranged with the electrical trace to at least mitigate detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit; and
a second electrical connection port for external connection between the switching control circuit and electrical connection port of the integrated circuit die.
14. The device of claim 13, further including one or more electrical connections between the connection ports of the switching control circuit and the integrated circuit die that are susceptible to monitoring of power consumption.
15. The device of claim 14, wherein the one or more electrical connections are part of a substrate upon which the integrated circuit die and the switching circuit are located.
16. A device comprising:
an integrated circuit die having
a cryptographic processing circuit configured and arranged to execute a cryptographic algorithm that causes a detectable change in power consumption by the cryptographic processing circuit;
a power storage circuit configured and arranged to store power sufficient for the cryptographic processing circuit to execute the cryptographic algorithm; and
an encapsulation structure that encapsulates the cryptographic processing circuit and the power storage circuit and that is configured and arranged to prevent physical tampering therewith;
a control circuit configured and arranged to
charge the power storage circuit by providing power from an external power source; and
disable, in response to the cryptographic processing circuit executing the cryptographic algorithm, the charging of the power storage circuit using the power from the external power source; and
a circuit-trace support structure having one or more electrical traces configured and arranged to provide power from the control circuit to the integrated circuit die and having an inductive coil configured and arranged to receive power from received radio frequency (RF) signals and to provide the received power to the control circuit, wherein the electrical traces are routed with and relative to the inductive coil and for providing power to the power storage circuit, thereby mitigating detection of electromagnetic field changes caused by power consumption from the cryptographic processing circuit.
US13/725,377 2012-12-21 2012-12-21 Cryptographic circuit protection from differential power analysis Active 2033-05-31 US9069959B2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US13/725,377 US9069959B2 (en) 2012-12-21 2012-12-21 Cryptographic circuit protection from differential power analysis
EP13198109.4A EP2746985B1 (en) 2012-12-21 2013-12-18 Cryptographic circuit protection from differential power analysis
CN201310713178.6A CN103886254B (en) 2012-12-21 2013-12-20 Cryptographic circuit protection from differential power analysis

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US13/725,377 US9069959B2 (en) 2012-12-21 2012-12-21 Cryptographic circuit protection from differential power analysis

Publications (2)

Publication Number Publication Date
US20140181534A1 US20140181534A1 (en) 2014-06-26
US9069959B2 true US9069959B2 (en) 2015-06-30

Family

ID=50028687

Family Applications (1)

Application Number Title Priority Date Filing Date
US13/725,377 Active 2033-05-31 US9069959B2 (en) 2012-12-21 2012-12-21 Cryptographic circuit protection from differential power analysis

Country Status (3)

Country Link
US (1) US9069959B2 (en)
EP (1) EP2746985B1 (en)
CN (1) CN103886254B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379309A1 (en) * 2012-11-12 2015-12-31 Chaologix, Inc. Charge distribution control for secure systems
US20160291669A1 (en) * 2015-03-30 2016-10-06 Nec Corporation Electronic circuit, arithmetic processing control method, program, and multi-core processor

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9659178B1 (en) * 2013-10-22 2017-05-23 Square, Inc. Device blanking
US9881184B2 (en) * 2015-10-30 2018-01-30 Intel Corporation Authenticity-assured data gathering apparatus and method
US10475034B2 (en) 2016-02-12 2019-11-12 Square, Inc. Physical and logical detections for fraud and tampering
US10255603B1 (en) 2017-08-31 2019-04-09 Sqaure, Inc. Processor power supply glitch mitigation
US11257072B1 (en) 2018-03-29 2022-02-22 Square, Inc. Detecting unauthorized devices
US11182794B1 (en) 2018-03-29 2021-11-23 Square, Inc. Detecting unauthorized devices using proximity sensor(s)
US10733291B1 (en) 2018-06-11 2020-08-04 Square, Inc. Bi-directional communication protocol based device security
GB2575670B (en) * 2018-07-19 2021-03-24 Secure Design Ltd Encryption device responsive to disconnection request
US11151290B2 (en) * 2018-09-17 2021-10-19 Analog Devices, Inc. Tamper-resistant component networks
US20220302830A1 (en) * 2021-03-18 2022-09-22 Northeastern University High efficiency power obfuscation switched capacitor dc-dc converter architecture

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN87104354A (en) 1986-06-23 1988-01-20 罗斯蒙德公司 Capacitive pressure transducer
WO1994005988A1 (en) 1992-09-01 1994-03-17 Rosemount Inc. Pedestal mount capacitive pressure sensor
CN2210389Y (en) 1994-08-26 1995-10-18 机械工业部沈阳仪器仪表工艺研究所 Single side differential structure linearized silicon capacitor pressure transducer
EP1107191A1 (en) 1999-12-09 2001-06-13 Pitney Bowes Inc. System and method for suppressing conducted emissions by a cryptographic device comprising an integrated circuit
WO2008019246A2 (en) 2006-08-04 2008-02-14 Yeda Research & Development Co. Ltd. Method and apparatus for protecting rfid tags from power analysis
US7380150B2 (en) * 2003-02-28 2008-05-27 Texas Instruments Incorporated Method for selecting an inductive or battery power supply based on the voltage sensed therefrom for a transponder system
US20090136035A1 (en) * 2007-11-27 2009-05-28 Samsung Electronics Co., Ltd. Public key infrastructure-based bluetooth smart-key system and operating method thereof
CN101711348A (en) 2007-06-04 2010-05-19 Nxp股份有限公司 Pressure gauge
US20100194205A1 (en) 2009-02-03 2010-08-05 The Regents Of The University Of Michigan Isolation circuitry and method for hiding a power consumption characteristic of an associated processing circuit
JP4542397B2 (en) 2004-09-02 2010-09-15 キヤノンアネルバ株式会社 Manufacturing method of capacitive pressure sensor
US20110102164A1 (en) * 2004-06-25 2011-05-05 Lear Corporation Remote fob integrated in a personal convenience device
CN202153165U (en) 2011-07-14 2012-02-29 无锡芯感智半导体有限公司 Capacitive MEMS (Micro-Electro-Mechanical System) pressure sensor
US20120210138A1 (en) 2011-02-16 2012-08-16 Honeywell International Inc. Cryptographic logic circuit with resistance to differential power analysis
EP2587469A1 (en) 2011-10-27 2013-05-01 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits
US8525545B1 (en) * 2011-08-26 2013-09-03 Lockheed Martin Corporation Power isolation during sensitive operations
US8624624B1 (en) * 2011-08-26 2014-01-07 Lockheed Martin Corporation Power isolation during sensitive operations

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8027168B2 (en) * 2008-08-13 2011-09-27 Delphi Technologies, Inc. Electrical center with vertical power bus bar
US8534101B2 (en) * 2010-02-22 2013-09-17 GM Global Technology Operations LLC Electronic unlatch system for vehicle door
DE102010011805A1 (en) * 2010-03-18 2011-09-22 Linde Aktiengesellschaft Process for the biotechnological production of a hydrogen carrier

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4730496A (en) 1986-06-23 1988-03-15 Rosemount Inc. Capacitance pressure sensor
CN87104354A (en) 1986-06-23 1988-01-20 罗斯蒙德公司 Capacitive pressure transducer
WO1994005988A1 (en) 1992-09-01 1994-03-17 Rosemount Inc. Pedestal mount capacitive pressure sensor
CN2210389Y (en) 1994-08-26 1995-10-18 机械工业部沈阳仪器仪表工艺研究所 Single side differential structure linearized silicon capacitor pressure transducer
EP1107191A1 (en) 1999-12-09 2001-06-13 Pitney Bowes Inc. System and method for suppressing conducted emissions by a cryptographic device comprising an integrated circuit
US7380150B2 (en) * 2003-02-28 2008-05-27 Texas Instruments Incorporated Method for selecting an inductive or battery power supply based on the voltage sensed therefrom for a transponder system
US20110102164A1 (en) * 2004-06-25 2011-05-05 Lear Corporation Remote fob integrated in a personal convenience device
JP4542397B2 (en) 2004-09-02 2010-09-15 キヤノンアネルバ株式会社 Manufacturing method of capacitive pressure sensor
WO2008019246A2 (en) 2006-08-04 2008-02-14 Yeda Research & Development Co. Ltd. Method and apparatus for protecting rfid tags from power analysis
CN101711348A (en) 2007-06-04 2010-05-19 Nxp股份有限公司 Pressure gauge
US20100154553A1 (en) 2007-06-04 2010-06-24 Nxp B.V. Pressure gauge
US20090136035A1 (en) * 2007-11-27 2009-05-28 Samsung Electronics Co., Ltd. Public key infrastructure-based bluetooth smart-key system and operating method thereof
US20100194205A1 (en) 2009-02-03 2010-08-05 The Regents Of The University Of Michigan Isolation circuitry and method for hiding a power consumption characteristic of an associated processing circuit
US20120210138A1 (en) 2011-02-16 2012-08-16 Honeywell International Inc. Cryptographic logic circuit with resistance to differential power analysis
CN202153165U (en) 2011-07-14 2012-02-29 无锡芯感智半导体有限公司 Capacitive MEMS (Micro-Electro-Mechanical System) pressure sensor
US8525545B1 (en) * 2011-08-26 2013-09-03 Lockheed Martin Corporation Power isolation during sensitive operations
US8624624B1 (en) * 2011-08-26 2014-01-07 Lockheed Martin Corporation Power isolation during sensitive operations
EP2587469A1 (en) 2011-10-27 2013-05-01 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits
US8635467B2 (en) * 2011-10-27 2014-01-21 Certicom Corp. Integrated circuit with logic circuitry and multiple concealing circuits

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"BMW Keys-Mercedes Keys-Alfa Romeo Keys-Fiat Keys-Car Key Repair Specialists-Automotive Locksmith-Auto Electronic Specialists-Auto Electrical-Auto Mechanical-Auto Diagnostics in Auckland-Automotive Servicing-Air Conditioning-GT Mechtronix Ltd", 6 pgs., retrieved from the Internet Mar. 17, 2014 at: http://gtmechtronix.co.nz/imagesjkey programming repairs.jpg-Retrieved from the Internet: URL:http:jjweb.archive.orgjweb/20120410051612/http://www.gtmechtronix.co.nz;index.php?content=carkeyrepairs (Apr. 10, 2012).
"Smart key"opedia, 4 pgs., retrieved from the Internet Mar. 17, 2014 at : http://en.wikipedia.org/w/index.php?title=Smart-key&direction=next&oldid=516750902 (Oct. 20, 2012).
Extended European Search Report for European Patent Appln. No. 13198109.4 (Mar. 27, 2014).

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150379309A1 (en) * 2012-11-12 2015-12-31 Chaologix, Inc. Charge distribution control for secure systems
US9430678B2 (en) * 2012-11-12 2016-08-30 Chaologix, Inc. Charge distribution control for secure systems
US20160291669A1 (en) * 2015-03-30 2016-10-06 Nec Corporation Electronic circuit, arithmetic processing control method, program, and multi-core processor
US10534418B2 (en) * 2015-03-30 2020-01-14 Nec Corporation Electronic circuit, arithmetic processing control method, program, and multi-core processor

Also Published As

Publication number Publication date
US20140181534A1 (en) 2014-06-26
CN103886254A (en) 2014-06-25
EP2746985A1 (en) 2014-06-25
EP2746985B1 (en) 2015-12-16
CN103886254B (en) 2017-01-11

Similar Documents

Publication Publication Date Title
US9069959B2 (en) Cryptographic circuit protection from differential power analysis
KR101377887B1 (en) Random number generator in a battery pack
TWI687831B (en) Battery control ic, battery pack, and authentication method thereof
US7984301B2 (en) Bi-processor architecture for secure systems
US10305679B2 (en) Method for implementing a communication between control units
US20090122989A1 (en) Smart storage device
US10417626B1 (en) Secure contactless payment method and device with active electronic circuitry
US11741457B2 (en) Secure countless payment method and device with movement-activated electronic circuitry
US10762177B2 (en) Method for preventing an unauthorized operation of a motor vehicle
JP2013131868A (en) Temperature sensor, encryption device, encryption method, and individual information generation device
US20150324583A1 (en) Method for operating a control unit
US20120036371A1 (en) Protection from cryptoanalytic side-channel attacks
KR102294211B1 (en) Central and delegate security processors for computing devices
CN113597747A (en) Apparatus and method for detection and localization of fault injection attacks
CN107533607A (en) Attack detecting is carried out by signal delay monitoring
US20190081788A1 (en) System And Method Trusted Workspace In Commercial Mobile Devices
US9960818B2 (en) Near field communication circuit
US11018879B2 (en) Method and system for authentication with side-channel attack protection using pre-calculated ciphers
JP4943882B2 (en) Authentication device, device to be authenticated, and battery authentication system
KR102316489B1 (en) Batterypack including wireless communication module
CN117640061A (en) Anti-side channel attack password card

Legal Events

Date Code Title Description
AS Assignment

Owner name: NXP B.V., NETHERLANDS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOWOTTNICK, JUERGEN;REEL/FRAME:029620/0605

Effective date: 20130104

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:038017/0058

Effective date: 20160218

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12092129 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:039361/0212

Effective date: 20160218

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12681366 PREVIOUSLY RECORDED ON REEL 039361 FRAME 0212. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:042762/0145

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12681366 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:042985/0001

Effective date: 20160218

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4

AS Assignment

Owner name: NXP B.V., NETHERLANDS

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:050745/0001

Effective date: 20190903

AS Assignment

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 042762 FRAME 0145. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051145/0184

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 039361 FRAME 0212. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051029/0387

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 042985 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051029/0001

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION12298143 PREVIOUSLY RECORDED ON REEL 042985 FRAME 0001. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051029/0001

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION12298143 PREVIOUSLY RECORDED ON REEL 039361 FRAME 0212. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051029/0387

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION 12298143 PREVIOUSLY RECORDED ON REEL 038017 FRAME 0058. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051030/0001

Effective date: 20160218

Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND

Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE APPLICATION12298143 PREVIOUSLY RECORDED ON REEL 042762 FRAME 0145. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY AGREEMENT SUPPLEMENT;ASSIGNOR:NXP B.V.;REEL/FRAME:051145/0184

Effective date: 20160218

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8